Picture 1 of 1

Gallery
Picture 1 of 1

Mastering Identity and Access Management with Microsoft Azure : Empower Users by
US $75.00
ApproximatelyPHP 4,180.50
Condition:
“Close to like new with only minor shelf wear.”
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Ground Advantage®.
Located in: Groton, Massachusetts, United States
Delivery:
Estimated between Thu, 12 Jun and Wed, 18 Jun to 94104
Returns:
30 days return. Seller pays for return shipping.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:285633354316
Item specifics
- Condition
- Very Good
- Seller Notes
- “Close to like new with only minor shelf wear.”
- ISBN
- 9781789132304
About this product
Product Identifiers
Publisher
Packt Publishing, The Limited
ISBN-10
1789132304
ISBN-13
9781789132304
eBay Product ID (ePID)
14038651957
Product Key Features
Number of Pages
698 Pages
Publication Name
Mastering Identity and Access Management with Microsoft Azure : Empower Users by Managing and Protecting Identities and Data, 2nd Edition
Language
English
Publication Year
2019
Subject
Software Development & Engineering / General, Cloud Computing, Security / General, System Administration / Disaster & Recovery, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Length
3.6 in
Item Width
3 in
Additional Product Features
Edition Number
2
Intended Audience
Trade
Table Of Content
Table of Contents Building and Managing Azure Active Directory Understanding Identity Synchronization Exploring Advanced Synchronization Concepts Monitoring Your Identity Bridge Configuring and Managing Identity Protection Managing Authentication Protocols Deploying Solutions on Azure AD and ADFS Using the Azure AD App Proxy and the Web Application Proxy Deploying Additional Applications on Azure AD Exploring Azure AD Identity Services Creating Identity Life Cycle Management on Azure Creating a New Security Culture Identifying and Detecting Sensitive Data Understanding Encryption Key Management Strategies Configuring Azure Information Protection Solutions Azure Information Protection Development Overview
Synopsis
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up-to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions., With the digital transformation many organizations are currently going through, they realize that the statement " Identity is the new control plane and new perimeter" is not just fiction, it's reality. This book is a crisp and clear, hands-on guide with project scenarios tailored to help you solve real challenges in the field of Identity and ..., Master powerful strategies to acquire and analyze evidence from real-life scenarios Key Features A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience Book Description Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and """"""""plays"""""""" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud. What You Will Learn Understand the challenges of mobile forensics Grasp how to properly deal with digital evidence Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices Know what forensic outcome to expect under given circumstances Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods Get in-depth knowledge of the different acquisition methods for all major mobile platforms Discover important mobile acquisition tools and techniques for all of the major platforms Who This Book Is For This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.
Item description from the seller
Seller feedback (9,238)
- 1***u (1926)- Feedback left by buyer.Past monthVerified purchaseAll went the best here thanks
- w***6 (289)- Feedback left by buyer.Past monthVerified purchaseFast Shipping and Good Price - Thanks - A+++
- e***e (689)- Feedback left by buyer.Past monthVerified purchaseGreat Seller, Thanks